E


EAP. See Extensible Authentication Protocol

eavesdropping, 57. See also man-in-the-middle attacks

wireless networks and, 472-474

ECC. See Elliptical Curve Cryptography

edit.exe, 216

edlin.exe, 216

Effective Permissions tab, 172

EFI (Extended Firmware Interface), 9, 10, 74

Boot Manager, 74, 75

firmware, 74, 75

64-bit platform and, 74

EFS. See Encryption File System

802.11 Legacy wireless security recommendations, 477-480

changing AP's default Administrator Password, 480

changing AP's default SSID, 478

disabling DHCP on AP, 478-479

disabling SSID broadcasting, 479-480

enabling MAC filtering, 478

requiring user authentication passwords, 479

802.11 Wi-Fi standards, 463-464

802.11 wireless networks, 461. See also wireless networks

elevate tool, 166

elevated processes, 134

elevate.exe application, 166, 167

elevation, 130-140

auditing, 162-164

command prompt, 166-167

installers and, 166

non-admin, 137-139

prompts, 133

scripts and, 166

special topics, 139-140

of standard users, 150-151, 168

of unsigned executables, 151

Windows Explorer and attempted, 154-156

Elliptical Curve Cryptography (ECC), 26

e-mail. See also Windows Mail

defenses, 390-398

anti-malware software, 398

disable automatic download of HTML content, 394-395

file attachment blocking, 395-398

HTML content in Restricted zone, 393-394

plain-text conversion, 391-393, 535

plain-text passwords disabled, 398

protection, 351-399

best practices, 399

as spam, 226

threats, 351-384

buffer overflow, 384

embedded content, 381-382

embedded links, 382

file attachments, 58, 351-381

leaked passwords, 383

miscellaneous, 383-384

embedded content, 381-382. See also malicious file attachments

embedded links, 382

empty DACLs. See discretionary access control lists

Enable .NET Framework setup (setting), 270, 279

encryption

digital certificates and, 257-258

enhancements/support, 26-27, 257-258

hard disk, 534-535

Encryption File System (EFS), 27, 77. See also BitLocker Drive Encryption

enhancements, 27

escalation, of privileges, 54-55

Ettercap, 57

event forwarding, 29, 30

Event Log interface, 29, 30

Event Log Readers, 24

event logs, 28

Group Policy and, 497-498

improvements, 28-29

as securable objects, 173

subscriptions, 30

event numbers, 162

new, 162

event triggers, 29

events, as securable processes, 173

exploitation techniques, malicious, 43-60

Extended Firmware Interface. See EFI

Extensible Application Markup Language. See XAML

Extensible Authentication Protocol (EAP), 468

versions, 468



Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net